Proceedings of the 17th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2017.
Contents (18 items)
- SCAM-2017-RuizCM #detection #source code
- Working Around Loops for Infeasible Path Detection in Binary Programs (JR, HC, MDM), pp. 1–10.
- SCAM-2017-PaduaS #analysis #exception
- Revisiting Exception Handling Practices with Exception Flow Analysis (GBdP, WS), pp. 11–20.
- SCAM-2017-BinkleyGIKY #slicing
- Tree-Oriented vs. Line-Oriented Observation-Based Slicing (DWB, NG, SSI, JK, SY), pp. 21–30.
- SCAM-2017-SuzukiPGLL #case study #functional #repository
- An Exploratory Study of Functional Redundancy in Code Repositories (MS, ACdP, EG, CVL, OALL), pp. 31–40.
- SCAM-2017-SayaghDAA #developer #empirical #framework #java #matter
- Does the Choice of Configuration Framework Matter for Developers? Empirical Study on 11 Java Configuration Frameworks (MS, ZD0, AA0, BA), pp. 41–50.
- SCAM-2017-SwidanSH #how #question
- How do Scratch Programmers Name Variables and Procedures? (AS, AS, FH), pp. 51–60.
- SCAM-2017-WangPXFZ #feature model #interactive #process #recommendation
- Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process (JW, XP0, ZX, KF, WZ), pp. 61–70.
- SCAM-2017-LeuenbergerOGN #java
- Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java (ML, HO, MG, ON), pp. 71–80.
- SCAM-2017-0008SMOBL #analysis #consistency #identifier #using
- Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
- SCAM-2017-LivaKP #automaton #java
- Extracting Timed Automata from Java Methods (GL, MTK0, MP0), pp. 91–100.
- SCAM-2017-SzalayPK #c #c++ #clustering #source code #towards
- Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based Solution (RS, ZP, DK), pp. 101–110.
- SCAM-2017-BangashSB #energy
- A Methodology for Relating Software Structure with Energy Consumption (AAB, HS, MOB), pp. 111–120.
- SCAM-2017-GhafariGN #android #security #smell
- Security Smells in Android (MG, PG, ON), pp. 121–130.
- SCAM-2017-RahmanR #empirical #on the
- On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study (MSR0, CKR), pp. 131–140.
- SCAM-2017-AtzenhoferP #automation #java #library #static analysis
- Automatically Adding Missing Libraries to Java Projects to Foster Better Results from Static Analysis (TA, RP), pp. 141–146.
- SCAM-2017-NagyC #detection #embedded #java #query #smell #sql
- A Static Code Smell Detector for SQL Queries Embedded in Java Code (CN0, AC), pp. 147–152.
- SCAM-2017-Anderson0 #analysis #php #query #sql
- Supporting Analysis of SQL Queries in PHP AiR (DA, MH0), pp. 153–158.
- SCAM-2017-NashaatAM #detection #object-oriented #php #security #source code
- Detecting Security Vulnerabilities in Object-Oriented PHP Programs (MN, KA0, JM0), pp. 159–164.